Title :
On Approximation of New Optimization Methods for Assessing Network Vulnerability
Author :
Dinh, Thang N. ; Xuan, Ying ; Thai, My T. ; Park, E.K. ; Znati, Taieb
Author_Institution :
CISE Dept., Univ. of Florida, Gainesville, FL, USA
Abstract :
Assessing network vulnerability before potential disruptive events such as natural disasters or malicious attacks is vital for network planning and risk management. It enables us to seek and safeguard against most destructive scenarios in which the overall network connectivity falls dramatically. Existing vulnerability assessments mainly focus on investigating the inhomogeneous properties of graph elements, node degree for example, however, these measures and the corresponding heuristic solutions can provide neither an accurate evaluation over general network topologies, nor performance guarantees to large scale networks. To this end, in this paper, we investigate a measure called pairwise connectivity and formulate this vulnerability assessment problem as a new graph-theoretical optimization problem called Ã-disruptor, which aims to discover the set of critical node/edges, whose removal results in the maximum decline of the global pairwise connectivity. Our results consist of the NP-Completeness and inapproximability proof of this problem, an O(log n log log n) pseudo-approximation algorithm for detecting the set of critical nodes and an O(log1.5 n) pseudo-approximation algorithm for detecting the set of critical edges. In addition, we devise an efficient heuristic algorithm and validate the performance of the our model and algorithms through extensive simulations.
Keywords :
graph theory; optimisation; risk management; telecommunication network planning; telecommunication network topology; telecommunication security; NP-completeness; critical edges; critical nodes; disruptive events; general network topology; global pairwise connectivity; graph elements; graph-theoretical optimization problem; malicious attacks; natural disasters; network connectivity; network planning; network vulnerability; node degree; pseudo-approximation algorithm; risk management; Ã\x9f-disruptor; Cities and towns; Communications Society; Degradation; Electric breakdown; Heuristic algorithms; Large-scale systems; Network topology; Optimization methods; Peer to peer computing; Risk management;
Conference_Titel :
INFOCOM, 2010 Proceedings IEEE
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-5836-3
DOI :
10.1109/INFCOM.2010.5462098